FileDownload
SetCmdDelay
SetRedirUrl
Static task
static1
Behavioral task
behavioral1
Sample
97f7fe2dac15b04fcf3393845fbfd514.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97f7fe2dac15b04fcf3393845fbfd514.exe
Resource
win10v2004-20231215-en
Target
97f7fe2dac15b04fcf3393845fbfd514
Size
22KB
MD5
97f7fe2dac15b04fcf3393845fbfd514
SHA1
88cf286ab24d59bf105851e4d5a7e9522e891430
SHA256
937f5b7d40dc93eaf053bb16eb356da33387a30ba1677a5d75d21624cff00ca2
SHA512
2d3ec1e204d2ab8a61a0864b5562ada4853620e4b3a9a915bff507b362f31c604606fa9c36289998c0320ad9339a95a2dfb03c7e235b525b0dd0015d23edfb56
SSDEEP
384:P8+YdDoJLOjZ/WM+E7D2/dtqHMfbGYwHYeh3/b:PxYVELCnWtqHMfbS4eJ
Checks for missing Authenticode signature.
resource |
---|
97f7fe2dac15b04fcf3393845fbfd514 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
RtlCreateRegistryKey
NtCreateMutant
NtClose
strstr
NtOpenMutant
_stricmp
_strnicmp
NtQueryValueKey
RtlWriteRegistryValue
NtOpenKey
_memicmp
RtlRandom
strchr
_snwprintf
sscanf
RtlImageNtHeader
RtlImageDirectoryEntryToData
RtlEqualUnicodeString
NtQuerySystemInformation
LdrLoadDll
RtlInitUnicodeString
_snprintf
strncpy
memset
_chkstk
memcpy
PathFindFileNameA
PathMatchSpecA
closesocket
HttpSendRequestA
HttpOpenRequestA
InternetSetOptionA
InternetReadFile
InternetOpenA
InternetGetLastResponseInfoA
InternetConnectA
HttpQueryInfoA
InternetQueryOptionA
InternetCloseHandle
InternetCrackUrlA
GetModuleHandleA
GetTempFileNameA
CreateProcessA
CreateProcessW
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
CreateThread
GetTempPathA
GetModuleFileNameA
GetExitCodeThread
CreateFileMappingA
ReadFile
GetFileAttributesA
TerminateThread
WriteFile
GetProcessHeap
GetTickCount
WaitForSingleObject
HeapFree
HeapAlloc
UnmapViewOfFile
MapViewOfFile
SetFilePointer
GetFileSize
CreateFileA
HeapReAlloc
VirtualProtect
GetVersionExA
SetFileAttributesA
GetSystemWindowsDirectoryA
Sleep
GetVolumeInformationA
MoveFileExA
FreeLibrary
GetLastError
GetProcAddress
LoadLibraryA
DeleteFileA
GetCurrentProcess
VirtualFree
CreateRemoteThread
OpenProcess
GetComputerNameA
VirtualAlloc
VirtualAllocEx
CloseHandle
WriteProcessMemory
VirtualFreeEx
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FileDownload
SetCmdDelay
SetRedirUrl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ